Skip to content

Commit 7ff95cc

Browse files
authored
Merge pull request #191004 from rohitnayakmsft/patch-12
GA docs prep for OFR
2 parents bd4e0c6 + dc0656e commit 7ff95cc

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/azure-sql/database/outbound-firewall-rule-overview.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.reviewer: kendralittle, vanto, mathoma
1111
ms.date: 11/10/2021
1212
---
1313

14-
# Outbound firewall rules for Azure SQL Database and Azure Synapse Analytics (preview)
14+
# Outbound firewall rules for Azure SQL Database and Azure Synapse Analytics
1515
[!INCLUDE[appliesto-sqldb-asa](../includes/appliesto-sqldb-asa-formerly-sqldw.md)]
1616

1717
Outbound firewall rules limit network traffic from the Azure SQL logical server to a customer defined list of Azure Storage accounts and Azure SQL logical servers. Any attempt to access storage accounts or SQL Databases not in this list is denied. The following Azure SQL Database features support this feature:
@@ -26,6 +26,9 @@ Outbound firewall rules limit network traffic from the Azure SQL logical server
2626
> [!IMPORTANT]
2727
> This article applies to both Azure SQL Database and [dedicated SQL pool (formerly SQL DW)](../../synapse-analytics\sql-data-warehouse\sql-data-warehouse-overview-what-is.md) in Azure Synapse Analytics. These settings apply to all SQL Database and dedicated SQL pool (formerly SQL DW) databases associated with the server. For simplicity, the term 'database' refers to both databases in Azure SQL Database and Azure Synapse Analytics. Likewise, any references to 'server' is referring to the [logical SQL server](logical-servers.md) that hosts Azure SQL Database and dedicated SQL pool (formerly SQL DW) in Azure Synapse Analytics. This article does *not* apply to Azure SQL Managed Instance or dedicated SQL pools in Azure Synapse Analytics workspaces.
2828
29+
> [!IMPORTANT]
30+
> Outbound firewall rules are defined at the [logical SQL server](logical-servers.md). Geo-replication and Auto-failover groups require the same set of rules to be defined on the primary and all secondarys
31+
2932
## Set outbound firewall rules in the Azure portal
3033

3134
1. Browse to the **Outbound networking** section in the **Firewalls and virtual networks** blade for your Azure SQL Database and select **Configure outbound networking restrictions**.

0 commit comments

Comments
 (0)